• mox@lemmy.sdf.org
    link
    fedilink
    arrow-up
    33
    arrow-down
    1
    ·
    edit-2
    4 months ago

    Using a tool like this to hide sections of code presented for review places a lot of trust in the automation. If Mallory were to discover a blind spot in the semantic diff logic, she could slip in a small change for eventual use in an exploit, and it would never be seen by another human.

    For example, consider this part of the exploit used in the recent xz backdoor. In case you don’t see the problem, here’s the fix.

    Rather than hiding code from review, if a tool figured out a way to use semantic understanding to highlight code that might be overlooked by a human (and should therefore be reviewed more carefully), it could conceivably help find such things.

    • Bogasse@lemmy.ml
      link
      fedilink
      arrow-up
      6
      arrow-down
      1
      ·
      edit-2
      4 months ago

      I don’t have an opinion on the topic but I see a blind spot in your argument, so I have to be that kind of person … 🥺

      One could use the exact same example to argue that humans are very bad at parsing code (especially if whitespace kicks in). In that regard a tool that allows them to reason on a standardized representation of the AST can be a protection against a whole class of attacks.

      • mox@lemmy.sdf.org
        link
        fedilink
        arrow-up
        10
        ·
        edit-2
        4 months ago

        That’s not a blind spot in my comment. See my final paragraph.

        It’s only one sentence. Maybe it was easy to miss. :)

        • Solemn@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          1
          ·
          4 months ago

          I like the idea, but I can’t come up with any method that won’t devolve into most reviewers only checking the highlighted parts tbh.

    • FizzyOrange@programming.dev
      link
      fedilink
      arrow-up
      2
      arrow-down
      2
      ·
      4 months ago

      If Mallory were to discover a blind spot in the semantic diff logic

      This is a very big stretch IMO. That xz change wasn’t actually the exploit, it was just used to make the exploit less detectable. And it was added by people with commit access so it didn’t even have to go through code review.

      On top of that, code review is not magic. It’s easy to get bugs past it hiding in plain sight (if that wasn’t the case Linux would be bug free!).

      Can you think of an actually realistic example?